Have something to say?

Ready to be published? LXer is read by around 350,000 individuals each month, and is an excellent place for you to publish your ideas, thoughts, reviews, complaints, etc. Do you have something to say to the Linux community?

Trustix alert: kernel 2.2.25

A hole was discovered in the mremap. Through this hole, it is possible for anyone with a local account on the system to gain root privileges. See CAN-2004-0077 for additional details. This is the kernel 2.2.25 counterpart to the security hole fixed in TSLSA-2004-0007.

Problem description:
A hole was discovered in the mremap. Through this hole, it is possible
for anyone with a local account on the system to gain root privileges.
See CAN-2004-0077 for additional details. This is the kernel 2.2.25
counterpart to the security hole fixed in TSLSA-2004-0007.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.

Location:
All Trustix updates are available from

About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.

Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.

Public testing:
Most updates for Trustix are made available for public testing some time
before release.
If you want to contribute by testing the various packages in the
testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at

You may also use swup for public testing of updates:
site {
class = 0
location = "http://tsldev.trustix.org/cloud/rdfs/latest.rdf"
regexp = ".*"
}

Questions?
Check out our mailing lists:

Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:

The advisory itself is available from the errata pages at
or directly at